Skip to content

Conversation

@nakabonne
Copy link
Member

What this PR does / why we need it:
With it we can set the credentials with --set-file secret.awsCredentials.data=/path/to

Which issue(s) this PR fixes:

Fixes #

Does this PR introduce a user-facing change?:

NONE

@pipecd-bot
Copy link
Collaborator

COVERAGE

Code coverage for golang is 33.83%. This pull request does not change code coverage.

@khanhtc1202
Copy link
Member

/lgtm

decryptServiceAccount:
fileName: sealed-secret-gcpkms-decrypt-service-account
data: ""
awsCredentials:
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Should we put this inside an imageProvider block?

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

You intend to clearly distinguish from other use cases (e.g. Lambda Deployment), right? If so, agree with you!

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yes. That is the point.

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Okay 👍

Copy link
Member

@khanhtc1202 khanhtc1202 Dec 22, 2020

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Then we have to configure credentials for each use-case for specific requirements? 🤔

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Hmm... on second thought I'm begging to feel we don't have to distinguish them as @khanhtc1202 may consider. In the general case, a piped operator prepares an AWS IAM user for piped and attach needed roles. I'd say it's an edge case to separate users by features.

Copy link
Member Author

@nakabonne nakabonne Dec 22, 2020

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

(FYI: the Go SDK for AWS is load credentials from the environment variables by default. It must be shared in a single process.)

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Got it. 👍

@nghialv
Copy link
Member

nghialv commented Dec 22, 2020

/approve

@pipecd-bot
Copy link
Collaborator

APPROVE

This pull request is APPROVED by nghialv.

Approvers can cancel the approval by writing /approve cancel in a comment. Any additional commits also will change this pull request to be not-approved.

@pipecd-bot pipecd-bot merged commit 9991114 into master Dec 22, 2020
@pipecd-bot pipecd-bot deleted the aws-credentials branch December 22, 2020 05:42
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

5 participants